default search action
Svetla Nikova
Person information
- affiliation: KU Leuven, ESAT-COSIC and imec, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 133-156 (2024) - [j25]Amund Askeland, Svetla Nikova, Ventzislav Nikov:
Who Watches the Watchers: Attacking Glitch Detection Circuits. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 157-179 (2024) - [c59]Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. COSADE 2024: 76-89 - [c58]Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice. CT-RSA 2024: 433-459 - [i47]Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
CAPABARA: A Combined Attack on CAPA. IACR Cryptol. ePrint Arch. 2024: 287 (2024) - [i46]Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov:
SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice. IACR Cryptol. ePrint Arch. 2024: 289 (2024) - [i45]Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel:
Time-Averaged Analysis of Selfish Mining in Bitcoin. IACR Cryptol. ePrint Arch. 2024: 363 (2024) - [i44]Roozbeh Sarenche, Svetla Nikova, Bart Preneel:
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols. IACR Cryptol. ePrint Arch. 2024: 622 (2024) - [i43]Zhenda Zhang, Svetla Nikova, Ventzislav Nikov:
Glitch-Stopping Circuits: Hardware Secure Masking without Registers. IACR Cryptol. ePrint Arch. 2024: 891 (2024) - 2023
- [j24]Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen:
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes. IEEE Trans. Inf. Theory 69(10): 6700-6710 (2023) - [c57]Siemen Dhooghe, Svetla Nikova:
The Random Fault Model. SAC 2023: 191-212 - [i42]Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, Kazuo Sakiyama:
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M. IACR Cryptol. ePrint Arch. 2023: 1129 (2023) - [i41]Samuele Andreoli, Enrico Piccione, Lilya Budaghyan, Pantelimon Stanica, Svetla Nikova:
On Decompositions of Permutations in Quadratic Functions. IACR Cryptol. ePrint Arch. 2023: 1632 (2023) - [i40]Amund Askeland, Svetla Nikova, Ventzislav Nikov:
Who Watches the Watchers: Attacking Glitch Detection Circuits. IACR Cryptol. ePrint Arch. 2023: 1647 (2023) - 2022
- [j23]Siemen Dhooghe, Svetla Nikova:
Resilient uniformity: applying resiliency in masking. Cryptogr. Commun. 14(1): 41-58 (2022) - [c56]Amund Askeland, Siemen Dhooghe, Svetla Nikova, Vincent Rijmen, Zhenda Zhang:
Guarding the First Order: The Rise of AES Maskings. CARDIS 2022: 103-122 - [c55]Fairouz Zobiri, Mariana Gama, Svetla Nikova, Geert Deconinck:
A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation. ISGT 2022: 1-5 - [i39]Victor Arribas, Zhenda Zhang, Svetla Nikova:
LLTI: Low-Latency Threshold Implementations. IACR Cryptol. ePrint Arch. 2022: 418 (2022) - [i38]Enrico Piccione, Samuele Andreoli, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Svetla Nikova, George Petrides, Vincent Rijmen:
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes. IACR Cryptol. ePrint Arch. 2022: 1141 (2022) - 2021
- [j22]Victor Arribas, Zhenda Zhang, Svetla Nikova:
LLTI: Low-Latency Threshold Implementations. IEEE Trans. Inf. Forensics Secur. 16: 5108-5123 (2021) - [c54]Sammy de Figueiredo, Akash Madhusudan, Vincent Reniers, Svetla Nikova, Bart Preneel:
Exploring the storj network: a security analysis. SAC 2021: 257-264 - [i37]Siemen Dhooghe, Svetla Nikova, Vincent Rijmen:
First-Order Hardware Sharings of the AES. IACR Cryptol. ePrint Arch. 2021: 734 (2021) - [i36]Siemen Dhooghe, Svetla Nikova:
Resilient Uniformity: Applying Resiliency in Masking. IACR Cryptol. ePrint Arch. 2021: 1094 (2021) - 2020
- [c53]Siemen Dhooghe, Svetla Nikova:
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries. CARDIS 2020: 181-195 - [c52]Siemen Dhooghe, Svetla Nikova:
My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks. CT-RSA 2020: 35-55 - [c51]Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova:
Cryptographic Fault Diagnosis using VerFI. HOST 2020: 229-240 - [c50]Vincent Reniers, Yuan Gao, Ren Zhang, Paolo Viviani, Akash Madhusudan, Bert Lagaisse, Svetla Nikova, Dimitri Van Landuyt, Riccardo Lombardi, Bart Preneel, Wouter Joosen:
Authenticated and auditable data sharing via smart contract. SAC 2020: 324-331 - [i35]Anastasiya Gorodilova, Natalia N. Tokareva, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeria Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Roman Lebedev, Svetla Nikova, Alexey Oblaukhov, Irina Pankratova, Marina Pudovkina, Vincent Rijmen, Aleksei Udovenko:
On the Sixth International Olympiad in Cryptography NSUCRYPTO. CoRR abs/2005.09563 (2020) - [i34]Siemen Dhooghe, Svetla Nikova:
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries. IACR Cryptol. ePrint Arch. 2020: 1146 (2020)
2010 – 2019
- 2019
- [j21]Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Decomposition of permutations in a finite field. Cryptogr. Commun. 11(3): 379-384 (2019) - [j20]Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Constructions of S-boxes with uniform sharing. Cryptogr. Commun. 11(3): 385-398 (2019) - [j19]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO). Cryptologia 43(2): 138-174 (2019) - [j18]Victor Arribas, Svetla Nikova, Vincent Rijmen:
Guards in action: First-order SCA secure implementations of KETJE without additional randomness. Microprocess. Microsystems 71 (2019) - [j17]Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
M&M: Masks and Macs against Physical Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 25-50 (2019) - [c49]Siemen Dhooghe, Svetla Nikova, Vincent Rijmen:
Threshold Implementations in the Robust Probing Model. TIS@CCS 2019: 30-37 - [c48]Begül Bilgin, Svetla Nikova, Vincent Rijmen:
TIS'19: Theory of Implementation Security Workshop 2019. CCS 2019: 2701-2702 - [e5]Begül Bilgin, Svetla Petkova-Nikova, Vincent Rijmen:
Proceedings of ACM Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6827-8 [contents] - [i33]Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition. IACR Cryptol. ePrint Arch. 2019: 334 (2019) - [i32]Siemen Dhooghe, Svetla Nikova:
My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks. IACR Cryptol. ePrint Arch. 2019: 615 (2019) - [i31]Siemen Dhooghe, Svetla Nikova, Vincent Rijmen:
Threshold Implementations in the Robust Probing Model. IACR Cryptol. ePrint Arch. 2019: 1005 (2019) - [i30]Victor Arribas, Felix Wegener, Amir Moradi, Svetla Nikova:
Cryptographic Fault Diagnosis using VerFI. IACR Cryptol. ePrint Arch. 2019: 1312 (2019) - 2018
- [j16]Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen:
Rhythmic Keccak: SCA Security and Low Latency in HW. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 269-290 (2018) - [c47]Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel P. Smart:
CAPA: The Spirit of Beaver Against Physical Attacks. CRYPTO (1) 2018: 121-151 - [c46]Victor Arribas, Svetla Nikova, Vincent Rijmen:
Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness. DSD 2018: 492-499 - [c45]Abdelrahaman Aly, Aysajan Abidin, Svetla Nikova:
Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition. Financial Cryptography 2018: 291-309 - [c44]Victor Arribas, Svetla Nikova, Vincent Rijmen:
VerMI: Verification Tool for Masked Implementations. ICECS 2018: 381-384 - [i29]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO. CoRR abs/1806.02059 (2018) - [i28]Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Constructions of S-boxes with uniform sharing. IACR Cryptol. ePrint Arch. 2018: 92 (2018) - [i27]Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Decomposition of Permutations in a Finite Field. IACR Cryptol. ePrint Arch. 2018: 103 (2018) - [i26]Victor Arribas, Svetla Nikova, Vincent Rijmen:
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness. IACR Cryptol. ePrint Arch. 2018: 806 (2018) - [i25]Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
M&M: Masks and Macs against Physical Attacks. IACR Cryptol. ePrint Arch. 2018: 1195 (2018) - 2017
- [j15]Thomas De Cnudde, Svetla Nikova:
Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3291-3301 (2017) - [c43]Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rozic, Dave Singelée, Bohan Yang, Bart Preneel:
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network. CANS 2017: 347-369 - [c42]Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? COSADE 2017: 1-18 - [i24]Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen:
Rhythmic Keccak: SCA Security and Low Latency in HW. IACR Cryptol. ePrint Arch. 2017: 1193 (2017) - [i23]Oscar Reparaz, Lauren De Meyer, Begül Bilgin, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Nigel P. Smart:
CAPA: The Spirit of Beaver against Physical Attacks. IACR Cryptol. ePrint Arch. 2017: 1195 (2017) - [i22]Victor Arribas, Svetla Nikova, Vincent Rijmen:
VerMI: Verification Tool for Masked Implementations. IACR Cryptol. ePrint Arch. 2017: 1227 (2017) - 2016
- [j14]Georgi Ivanov, Nikolay Nikolov, Svetla Nikova:
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. Cryptogr. Commun. 8(2): 247-276 (2016) - [c41]Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES With d+1 Shares in Hardware. TIS@CCS 2016: 43 - [c40]Begül Bilgin, Svetla Nikova, Vincent Rijmen:
Theory of Implementation Security Workshop (TIs 2016). CCS 2016: 1875-1876 - [c39]Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. CHES 2016: 194-212 - [c38]Thomas De Cnudde, Svetla Nikova:
More Efficient Private Circuits II through Threshold Implementations. FDTC 2016: 114-124 - [e4]Begül Bilgin, Svetla Nikova, Vincent Rijmen:
Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016. ACM 2016, ISBN 978-1-4503-4575-0 [contents] - [e3]Sylvain Duquesne, Svetla Petkova-Nikova:
Arithmetic of Finite Fields - 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10064, 2016, ISBN 978-3-319-55226-2 [contents] - [i21]Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. IACR Cryptol. ePrint Arch. 2016: 631 (2016) - [i20]Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? IACR Cryptol. ePrint Arch. 2016: 1080 (2016) - 2015
- [j13]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Natalia N. Tokareva, Valeriya Vitkup:
Threshold implementations of small S-boxes. Cryptogr. Commun. 7(1): 3-33 (2015) - [j12]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Trade-Offs for Threshold Implementations Illustrated on AES. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(7): 1188-1200 (2015) - [c37]Georgi Ivanov, Nikolay Nikolov, Svetla Nikova:
Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm. BalkanCryptSec 2015: 31-42 - [c36]Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Ventzislav Nikov, Svetla Nikova:
Higher-Order Threshold Implementation of the AES S-Box. CARDIS 2015: 259-272 - [c35]Begül Bilgin, Miroslav Knezevic, Ventzislav Nikov, Svetla Nikova:
Compact Implementations of Multi-Sbox Designs. CARDIS 2015: 273-285 - [c34]Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating Masking Schemes. CRYPTO (1) 2015: 764-783 - [i19]Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:
Problems, solutions and experience of the first international student's Olympiad in cryptography. IACR Cryptol. ePrint Arch. 2015: 534 (2015) - [i18]Oscar Reparaz, Begül Bilgin, Svetla Nikova, Benedikt Gierlichs, Ingrid Verbauwhede:
Consolidating masking schemes. IACR Cryptol. ePrint Arch. 2015: 719 (2015) - 2014
- [j11]Zheng Gong, Pieter H. Hartel, Svetla Nikova, Shaohua Tang, Bo Zhu:
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks. J. Comput. Sci. Technol. 29(1): 53-68 (2014) - [c33]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. AFRICACRYPT 2014: 267-284 - [c32]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. ASIACRYPT (2) 2014: 326-343 - [c31]Thomas De Cnudde, Begül Bilgin, Oscar Reparaz, Svetla Nikova:
Higher-Order Glitch Resistant Implementation of the PRESENT S-Box. BalkanCryptSec 2014: 75-93 - [i17]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. IACR Cryptol. ePrint Arch. 2014: 751 (2014) - [i16]Georgi Ivanov, Nikolay Nikolov, Svetla Nikova:
Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties. IACR Cryptol. ePrint Arch. 2014: 801 (2014) - 2013
- [j10]Javier López, Svetla Nikova, Andreas Pashalidis, Günther Pernul, Bart Preneel:
Preface. Comput. Math. Appl. 65(5): 747 (2013) - [c30]Begül Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Gilles Van Assche:
Efficient and First-Order DPA Resistant Implementations of Keccak. CARDIS 2013: 187-199 - [i15]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. IACR Cryptol. ePrint Arch. 2013: 697 (2013) - 2012
- [c29]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes. CHES 2012: 76-91 - [e2]Svetla Petkova-Nikova, Andreas Pashalidis, Günther Pernul:
Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7163, Springer 2012, ISBN 978-3-642-29803-5 [contents] - [i14]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of all 3x3 and 4x4 S-boxes. IACR Cryptol. ePrint Arch. 2012: 300 (2012) - 2011
- [j9]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. J. Cryptol. 24(2): 292-321 (2011) - [c28]Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Public-Key Encryption with Delegated Search. ACNS 2011: 532-549 - [c27]Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. ISPEC 2011: 108-122 - [c26]Zheng Gong, Svetla Nikova, Yee Wei Law:
KLEIN: A New Family of Lightweight Block Ciphers. RFIDSec 2011: 1-18 - 2010
- [j8]Jan De Beule, Yves Edel, Emilia Käsper, Andreas Klein, Svetla Nikova, Bart Preneel, Jeroen Schillewaert, Leo Storme:
Galois geometries and applications. Des. Codes Cryptogr. 56(2-3): 85-86 (2010) - [j7]Paulo S. L. M. Barreto, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Elmar Tischhauser:
Whirlwind: a new cryptographic hash function. Des. Codes Cryptogr. 56(2-3): 141-162 (2010) - [c25]Saeed Sedghi, Peter van Liesdonk, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Searching Keywords with Wildcards on Encrypted Data. SCN 2010: 138-153
2000 – 2009
- 2009
- [c24]Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu:
Towards Secure and Practical MACs for Body Sensor Networks. INDOCRYPT 2009: 182-198 - [c23]Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. WISA 2009: 309-323 - [p1]Svetla Nikova, Ventzislav Nikov:
Secret Sharing and Error Correcting. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 28-38 - [e1]Bart Preneel, Stefan M. Dodunekov, Vincent Rijmen, Svetla Nikova:
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. NATO Science for Peace and Security Series - D: Information and Communication Security 23, IOS Press 2009, ISBN 978-1-60750-002-5 [contents] - [i13]Sebastiaan Indesteege, Elena Andreeva, Christophe De Cannière, Orr Dunkelman, Emilia Käsper, Svetla Nikova, Bart Preneel, Elmar Tischhauser:
The Lane hash function. Symmetric Cryptography 2009 - 2008
- [c22]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. ICISC 2008: 218-234 - [c21]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Using Normal Bases for Compact Hardware Implementations of the AES S-Box. SCN 2008: 236-245 - 2007
- [c20]Emilia Käsper, Ventzislav Nikov, Svetla Nikova:
Strongly Multiplicative Hierarchical Threshold Secret Sharing. ICITS 2007: 148-168 - [c19]Ventzislav Nikov, Svetla Nikova:
A Modification of Jarecki and Saxena Proactive RSA Signature Scheme. ISIT 2007: 1026-1029 - [i12]Yuri L. Borissov, Moon Ho Lee, Svetla Nikova:
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials. IACR Cryptol. ePrint Arch. 2007: 301 (2007) - 2006
- [j6]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of cubic (n-4)-resilient Boolean functions. IEEE Trans. Inf. Theory 52(4): 1670-1676 (2006) - [c18]Ventzislav Nikov, Svetla Nikova, Bart Preneel:
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. ASIACRYPT 2006: 348-363 - [c17]Svetla Nikova, Christian Rechberger, Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 - [i11]An Braeken, Ventzislav Nikov, Svetla Nikova:
On Zigzag Functions and Related Objects in New Metric. IACR Cryptol. ePrint Arch. 2006: 437 (2006) - 2005
- [j5]Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel:
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions. IEEE Trans. Inf. Theory 51(3): 1182-1189 (2005) - [c16]An Braeken, Ventzislav Nikov, Svetla Nikova:
Error-Set Codes and Related Objects. COCOON 2005: 577-585 - [c15]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties. ICALP 2005: 324-334 - [c14]Ventzislav Nikov, Svetla Nikova:
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes. WCC 2005: 275-290 - [i10]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Cubic (n-4)-resilient Boolean Functions. IACR Cryptol. ePrint Arch. 2005: 332 (2005) - 2004
- [c13]Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Robust Metering Schemes for General Access Structures. ICICS 2004: 53-65 - [c12]An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. INDOCRYPT 2004: 120-135 - [c11]Ventzislav Nikov, Svetla Nikova:
On Proactive Secret Sharing Schemes. Selected Areas in Cryptography 2004: 308-325 - [c10]Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On the Size of Monotone Span Programs. SCN 2004: 249-262 - [i9]An Braeken, Svetla Nikova, Ventzislav Nikov:
On Cheating Immune Secret Sharing. IACR Cryptol. ePrint Arch. 2004: 200 (2004) - [i8]Yuri L. Borissov, An Braeken, Svetla Nikova:
Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions. IACR Cryptol. ePrint Arch. 2004: 202 (2004) - [i7]An Braeken, Yuri L. Borissov, Svetla Nikova, Bart Preneel:
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties. IACR Cryptol. ePrint Arch. 2004: 248 (2004) - [i6]An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Boolean Functions with Generalized Cryptographic Properties. IACR Cryptol. ePrint Arch. 2004: 259 (2004) - [i5]Ventzislav Nikov, Svetla Nikova:
New Monotone Span Programs from Old. IACR Cryptol. ePrint Arch. 2004: 282 (2004) - 2003
- [j4]Yuri L. Borissov, Nikolai L. Manev, Svetla Nikova:
On the Non-minimal Codewords in Binary Reed-Muller Codes. Discret. Appl. Math. 128(1): 65-74 (2003) - [j3]Svetla Nikova, Ventzislav Nikov:
Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible. Des. Codes Cryptogr. 28(2): 201-222 (2003) - [c9]Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. ACNS 2003: 1-15 - [c8]Yuri L. Borissov, An Braeken, Svetla Nikova, Bart Preneel:
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions. IMACC 2003: 82-92 - [c7]Ventzislav Nikov, Svetla Nikova, Bart Preneel:
On Multiplicative Linear Secret Sharing Schemes. INDOCRYPT 2003: 135-147 - [i4]Ventzislav Nikov, Svetla Nikova, Bart Preneel:
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case. IACR Cryptol. ePrint Arch. 2003: 6 (2003) - [i3]Ventzislav Nikov, Svetla Nikova:
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes. IACR Cryptol. ePrint Arch. 2003: 210 (2003) - 2002
- [c6]Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On Unconditionally Secure Distributed Oblivious Transfer. INDOCRYPT 2002: 395-408 - [c5]Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. INDOCRYPT 2002: 422-436 - [c4]Yuri L. Borissov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On a Resynchronization Weakness in a Class of Combiners with Memory. SCN 2002: 164-173 - [i2]Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
Applying General Access Structure to Metering Schemes. IACR Cryptol. ePrint Arch. 2002: 102 (2002) - [i1]Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
Applying General Access Structure to Proactive Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2002: 141 (2002) - 2001
- [j2]Yuri L. Borissov, Nikolai L. Manev, Svetla Nikova:
On the Non-Minimal codewords of weight 2dmin in the binary Reed-Muller Code. Electron. Notes Discret. Math. 6: 548-555 (2001) - [c3]Svetla Nikova, Ventzislav Nikov:
Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces. IMACC 2001: 191-204
1990 – 1999
- 1999
- [j1]Peter G. Boyvalenkov, Danyo Danev, Svetla Nikova:
Nonexistence of Certain Spherical Designs of Odd Strengths and Cardinalities. Discret. Comput. Geom. 21(1): 143-156 (1999) - [c2]Svetla Nikova, Ventzislav Nikov:
Some Applications of Bounds for Designs to the Cryptography. IMACC 1999: 25-34 - 1993
- [c1]Peter G. Boyvalenkov, Svetla Nikova:
New lower bounds for some spherical designs. Algebraic Coding 1993: 207-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint